ID

VAR-202007-1133


CVE

CVE-2020-6514


TITLE

Google Chrome Security hole

Trust: 0.6

sources: CNNVD: CNNVD-202007-1004

DESCRIPTION

Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an attacker in a privileged network position to potentially exploit heap corruption via a crafted SCTP stream. Google Chrome is a web browser developed by Google (Google). WebRTC is one of the components that supports browsers for real-time voice or video conversations. A security vulnerability exists in WebRTC in versions prior to Google Chrome 84.0.4147.89. An attacker could exploit this vulnerability to bypass security restrictions. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: firefox security update Advisory ID: RHSA-2020:3253-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2020:3253 Issue date: 2020-07-30 CVE Names: CVE-2020-6463 CVE-2020-6514 CVE-2020-15652 CVE-2020-15659 ==================================================================== 1. Summary: An update for firefox is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 68.11.0 ESR. Security Fix(es): * chromium-browser: Use after free in ANGLE (CVE-2020-6463) * chromium-browser: Inappropriate implementation in WebRTC (CVE-2020-6514) * Mozilla: Potential leak of redirect targets when loading scripts in a worker (CVE-2020-15652) * Mozilla: Memory safety bugs fixed in Firefox 79 and Firefox ESR 68.11 (CVE-2020-15659) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Firefox must be restarted for the changes to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1840893 - CVE-2020-6463 chromium-browser: Use after free in ANGLE 1857349 - CVE-2020-6514 chromium-browser: Inappropriate implementation in WebRTC 1861570 - CVE-2020-15652 Mozilla: Potential leak of redirect targets when loading scripts in a worker 1861572 - CVE-2020-15659 Mozilla: Memory safety bugs fixed in Firefox 79 and Firefox ESR 68.11 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: firefox-68.11.0-1.el7_8.src.rpm x86_64: firefox-68.11.0-1.el7_8.x86_64.rpm firefox-debuginfo-68.11.0-1.el7_8.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: firefox-68.11.0-1.el7_8.i686.rpm firefox-debuginfo-68.11.0-1.el7_8.i686.rpm Red Hat Enterprise Linux Server (v. 7): Source: firefox-68.11.0-1.el7_8.src.rpm ppc64: firefox-68.11.0-1.el7_8.ppc64.rpm firefox-debuginfo-68.11.0-1.el7_8.ppc64.rpm ppc64le: firefox-68.11.0-1.el7_8.ppc64le.rpm firefox-debuginfo-68.11.0-1.el7_8.ppc64le.rpm s390x: firefox-68.11.0-1.el7_8.s390x.rpm firefox-debuginfo-68.11.0-1.el7_8.s390x.rpm x86_64: firefox-68.11.0-1.el7_8.x86_64.rpm firefox-debuginfo-68.11.0-1.el7_8.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): x86_64: firefox-68.11.0-1.el7_8.i686.rpm firefox-debuginfo-68.11.0-1.el7_8.i686.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: firefox-68.11.0-1.el7_8.src.rpm x86_64: firefox-68.11.0-1.el7_8.x86_64.rpm firefox-debuginfo-68.11.0-1.el7_8.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: firefox-68.11.0-1.el7_8.i686.rpm firefox-debuginfo-68.11.0-1.el7_8.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2020-6463 https://access.redhat.com/security/cve/CVE-2020-6514 https://access.redhat.com/security/cve/CVE-2020-15652 https://access.redhat.com/security/cve/CVE-2020-15659 https://access.redhat.com/security/updates/classification/#important https://www.mozilla.org/en-US/security/advisories/mfsa2020-31/ 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXyMgu9zjgjWX9erEAQg1Lw//ThDhQNyzbi/DcKqRZ4oE2crnYGEpor13 fbkpiATllwswE+uVcroydKTdj+hFJ3kopnSxTL2uvtIqq2fNAVRQiCyRwR5Cza7X i9khFoKJOoEtw4ZpkMOXEQxWBeAX9Jo8et1e3Fq0FP7SJvt+rTFJag380FKi+qUu Ixy+ks3rKmFPUdvSbqm4OMIIPJUJa04xRtx9qrHgMSsxw88bwEUezckl0unJorCq iGI2j9hjmiYGKhzr9TamTaQqRIKenn1E8J8gYrgHO5fBMaD5JaPchYM5KjPCsAyz Tv97a31s16Vn+gUKbb8HGORbXd1V8JtzqYowyQJm+DIj6/K1g0Ahjui7wI1+HIvq eQokM/2JHqulmG39kwfEze4X0T/AIiGKFxhLutRbih+YZ9XJ5utmhnJ02ueK7TWM rRRlyWw/lmryGCK5zOL5+9tx4rJUHxwiaQSDcCzf5Dtf4mEPhsizT5KBJCbdd5ZO AP+/eyAFnb5z/+Fsj35glsgF5mNuDb/DiYFKjrg11KKp/aViNx709ZVmi/jcGd6c hoba26uGhr4Dn8oWI+r0M5R/+jfiyJ0Ay/xhQrjwnj/hNArf0+Re3wsqtCTbRVrA PeesTMwXOBpuVJ7wCWtE1Ns2UdKy3COnBTla4xRE3U5JKSSD+Coi2HEwhZW0zUhH EmDN6VjH+XE=JK3R -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . 8) - aarch64, ppc64le, x86_64 3. 8.1) - ppc64le, x86_64 3. Description: Mozilla Thunderbird is a standalone mail and newsgroup client. 8.0) - aarch64, ppc64le, s390x, x86_64 3. 6) - i386, i686, x86_64 3. Security Fix(es): * chromium-browser: Heap buffer overflow in background fetch (CVE-2020-6510) * chromium-browser: Side-channel information leakage in content security policy (CVE-2020-6511) * chromium-browser: Type Confusion in V8 (CVE-2020-6512) * chromium-browser: Heap buffer overflow in PDFium (CVE-2020-6513) * chromium-browser: Inappropriate implementation in WebRTC (CVE-2020-6514) * chromium-browser: Use after free in tab strip (CVE-2020-6515) * chromium-browser: Policy bypass in CORS (CVE-2020-6516) * chromium-browser: Heap buffer overflow in history (CVE-2020-6517) * chromium-browser: Use after free in SCTP (CVE-2020-6532) * chromium-browser: Type Confusion in V8 (CVE-2020-6537) * chromium-browser: Inappropriate implementation in WebView (CVE-2020-6538) * chromium-browser: Use after free in CSS (CVE-2020-6539) * chromium-browser: Heap buffer overflow in Skia (CVE-2020-6540) * chromium-browser: Use after free in WebUSB (CVE-2020-6541) * chromium-browser: Use after free in developer tools (CVE-2020-6518) * chromium-browser: Policy bypass in CSP (CVE-2020-6519) * chromium-browser: Heap buffer overflow in Skia (CVE-2020-6520) * chromium-browser: Side-channel information leakage in autofill (CVE-2020-6521) * chromium-browser: Inappropriate implementation in external protocol handlers (CVE-2020-6522) * chromium-browser: Out of bounds write in Skia (CVE-2020-6523) * chromium-browser: Heap buffer overflow in WebAudio (CVE-2020-6524) * chromium-browser: Heap buffer overflow in Skia (CVE-2020-6525) * chromium-browser: Inappropriate implementation in iframe sandbox (CVE-2020-6526) * chromium-browser: Insufficient policy enforcement in CSP (CVE-2020-6527) * chromium-browser: Incorrect security UI in basic auth (CVE-2020-6528) * chromium-browser: Inappropriate implementation in WebRTC (CVE-2020-6529) * chromium-browser: Out of bounds memory access in developer tools (CVE-2020-6530) * chromium-browser: Side-channel information leakage in scroll to text (CVE-2020-6531) * chromium-browser: Type Confusion in V8 (CVE-2020-6533) * chromium-browser: Heap buffer overflow in WebRTC (CVE-2020-6534) * chromium-browser: Insufficient data validation in WebUI (CVE-2020-6535) * chromium-browser: Incorrect security UI in PWAs (CVE-2020-6536) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bugs fixed (https://bugzilla.redhat.com/): 1857320 - CVE-2020-6511 chromium-browser: Side-channel information leakage in content security policy 1857321 - CVE-2020-6512 chromium-browser: Type Confusion in V8 1857322 - CVE-2020-6513 chromium-browser: Heap buffer overflow in PDFium 1857323 - CVE-2020-6515 chromium-browser: Use after free in tab strip 1857324 - CVE-2020-6516 chromium-browser: Policy bypass in CORS 1857325 - CVE-2020-6518 chromium-browser: Use after free in developer tools 1857326 - CVE-2020-6519 chromium-browser: Policy bypass in CSP 1857327 - CVE-2020-6520 chromium-browser: Heap buffer overflow in Skia 1857328 - CVE-2020-6521 chromium-browser: Side-channel information leakage in autofill 1857329 - CVE-2020-6523 chromium-browser: Out of bounds write in Skia 1857330 - CVE-2020-6524 chromium-browser: Heap buffer overflow in WebAudio 1857331 - CVE-2020-6525 chromium-browser: Heap buffer overflow in Skia 1857332 - CVE-2020-6526 chromium-browser: Inappropriate implementation in iframe sandbox 1857333 - CVE-2020-6527 chromium-browser: Insufficient policy enforcement in CSP 1857334 - CVE-2020-6528 chromium-browser: Incorrect security UI in basic auth 1857336 - CVE-2020-6529 chromium-browser: Inappropriate implementation in WebRTC 1857337 - CVE-2020-6530 chromium-browser: Out of bounds memory access in developer tools 1857338 - CVE-2020-6531 chromium-browser: Side-channel information leakage in scroll to text 1857339 - CVE-2020-6533 chromium-browser: Type Confusion in V8 1857340 - CVE-2020-6534 chromium-browser: Heap buffer overflow in WebRTC 1857341 - CVE-2020-6535 chromium-browser: Insufficient data validation in WebUI 1857342 - CVE-2020-6536 chromium-browser: Incorrect security UI in PWAs 1857349 - CVE-2020-6514 chromium-browser: Inappropriate implementation in WebRTC 1857351 - CVE-2020-6517 chromium-browser: Heap buffer overflow in history 1857352 - CVE-2020-6522 chromium-browser: Inappropriate implementation in external protocol handlers 1857400 - CVE-2020-6510 chromium-browser: Heap buffer overflow in background fetch 1861464 - CVE-2020-6537 chromium-browser: Type Confusion in V8 1861465 - CVE-2020-6538 chromium-browser: Inappropriate implementation in WebView 1861466 - CVE-2020-6532 chromium-browser: Use after free in SCTP 1861467 - CVE-2020-6539 chromium-browser: Use after free in CSS 1861468 - CVE-2020-6540 chromium-browser: Heap buffer overflow in Skia 1861469 - CVE-2020-6541 chromium-browser: Use after free in WebUSB 6

Trust: 1.62

sources: NVD: CVE-2020-6514 // VULHUB: VHN-184639 // VULMON: CVE-2020-6514 // PACKETSTORM: 158686 // PACKETSTORM: 158787 // PACKETSTORM: 158678 // PACKETSTORM: 158786 // PACKETSTORM: 158673 // PACKETSTORM: 158804

AFFECTED PRODUCTS

vendor:opensusemodel:backports slescope:eqversion:15.0

Trust: 1.0

vendor:applemodel:watchosscope:ltversion:6.2.8

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:31

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:20.04

Trust: 1.0

vendor:applemodel:iphone osscope:ltversion:13.6

Trust: 1.0

vendor:applemodel:tvosscope:ltversion:13.4.8

Trust: 1.0

vendor:applemodel:ipadosscope:ltversion:13.6

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:32

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:18.04

Trust: 1.0

vendor:opensusemodel:leapscope:eqversion:15.1

Trust: 1.0

vendor:googlemodel:chromescope:ltversion:84.0.4147.89

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:opensusemodel:leapscope:eqversion:15.2

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:16.04

Trust: 1.0

vendor:applemodel:safariscope:ltversion:13.1.2

Trust: 1.0

sources: NVD: CVE-2020-6514

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-6514
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-202007-1004
value: MEDIUM

Trust: 0.6

VULHUB: VHN-184639
value: MEDIUM

Trust: 0.1

VULMON: CVE-2020-6514
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-6514
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

VULHUB: VHN-184639
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-6514
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-184639 // VULMON: CVE-2020-6514 // CNNVD: CNNVD-202007-1004 // NVD: CVE-2020-6514

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.1

sources: VULHUB: VHN-184639 // NVD: CVE-2020-6514

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202007-1004

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202007-1004

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-184639

PATCH

title:Google Chrome WebRTC Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=125058

Trust: 0.6

title:Red Hat: Important: firefox security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20203241 - Security Advisory

Trust: 0.1

title:Red Hat: Important: firefox security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20203229 - Security Advisory

Trust: 0.1

title:Red Hat: Important: firefox security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20203254 - Security Advisory

Trust: 0.1

title:Red Hat: Important: firefox security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20203253 - Security Advisory

Trust: 0.1

title:Red Hat: Important: thunderbird security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20203345 - Security Advisory

Trust: 0.1

title:Red Hat: Important: thunderbird security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20203342 - Security Advisory

Trust: 0.1

title:Red Hat: Important: thunderbird security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20203341 - Security Advisory

Trust: 0.1

title:Red Hat: Important: thunderbird security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20203344 - Security Advisory

Trust: 0.1

title:Red Hat: Important: thunderbird security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20203343 - Security Advisory

Trust: 0.1

title:Red Hat: Important: firefox security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20203233 - Security Advisory

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2020-6514 log

Trust: 0.1

title:Debian Security Advisories: DSA-4736-1 firefox-esr -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=f0293cff50ec970b1240b869491b449b

Trust: 0.1

title:Debian Security Advisories: DSA-4740-1 thunderbird -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=595ab9929be9ca4fd7754efd2b2ec848

Trust: 0.1

title:Amazon Linux 2: ALAS2-2020-1487url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2020-1487

Trust: 0.1

title:Mozilla: Security Vulnerabilities fixed in Thunderbird 68.11url:https://vulmon.com/vendoradvisory?qidtp=mozilla_advisories&qid=daa10d2abc08ddc986002e2009e2ef07

Trust: 0.1

title:Mozilla: Security Vulnerabilities fixed in Firefox ESR 68.11url:https://vulmon.com/vendoradvisory?qidtp=mozilla_advisories&qid=66935b62c2e2168bbb42f9dd63ad34d0

Trust: 0.1

title:Mozilla: Security Vulnerabilities fixed in Firefox 79url:https://vulmon.com/vendoradvisory?qidtp=mozilla_advisories&qid=15e6443673318a4cf3c00441012bc7dc

Trust: 0.1

title:Mozilla: Security Vulnerabilities fixed in Thunderbird 78.1url:https://vulmon.com/vendoradvisory?qidtp=mozilla_advisories&qid=fc87c5012b2db6ab5335efa436ac2afc

Trust: 0.1

title:Mozilla: Security Vulnerabilities fixed in Firefox ESR 78.1url:https://vulmon.com/vendoradvisory?qidtp=mozilla_advisories&qid=bbe08934fa63c5502ec220a0ae5d4ed4

Trust: 0.1

title:Red Hat: Critical: chromium-browser security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20203377 - Security Advisory

Trust: 0.1

title:Google Chrome: Stable Channel Update for Desktopurl:https://vulmon.com/vendoradvisory?qidtp=chrome_releases&qid=e29f2c41a4d132c672708c0b908a9126

Trust: 0.1

title:Debian Security Advisories: DSA-4824-1 chromium -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=c8d0e8247116dce5f4c1a481beaa1df7

Trust: 0.1

title:CVE-2020-6514url:https://github.com/cudi1999/CVE-2020-6514

Trust: 0.1

title:PoC in GitHuburl:https://github.com/soosmile/POC

Trust: 0.1

title:PoC in GitHuburl:https://github.com/developer3000S/PoC-in-GitHub

Trust: 0.1

title:PoC in GitHuburl:https://github.com/hectorgie/PoC-in-GitHub

Trust: 0.1

title:PoC in GitHuburl:https://github.com/0xT11/CVE-POC

Trust: 0.1

sources: VULMON: CVE-2020-6514 // CNNVD: CNNVD-202007-1004

EXTERNAL IDS

db:NVDid:CVE-2020-6514

Trust: 2.4

db:PACKETSTORMid:158697

Trust: 1.8

db:PACKETSTORMid:158678

Trust: 0.8

db:PACKETSTORMid:158804

Trust: 0.8

db:PACKETSTORMid:158789

Trust: 0.7

db:PACKETSTORMid:158565

Trust: 0.7

db:CNNVDid:CNNVD-202007-1004

Trust: 0.7

db:AUSCERTid:ESB-2020.2703

Trust: 0.6

db:AUSCERTid:ESB-2020.2580

Trust: 0.6

db:AUSCERTid:ESB-2020.2743

Trust: 0.6

db:AUSCERTid:ESB-2020.2623

Trust: 0.6

db:AUSCERTid:ESB-2021.0024

Trust: 0.6

db:AUSCERTid:ESB-2020.2640

Trust: 0.6

db:AUSCERTid:ESB-2020.2410

Trust: 0.6

db:AUSCERTid:ESB-2020.2605

Trust: 0.6

db:AUSCERTid:ESB-2020.2851

Trust: 0.6

db:AUSCERTid:ESB-2020.2757

Trust: 0.6

db:AUSCERTid:ESB-2020.2675

Trust: 0.6

db:NSFOCUSid:50126

Trust: 0.6

db:PACKETSTORMid:158787

Trust: 0.2

db:PACKETSTORMid:158686

Trust: 0.2

db:PACKETSTORMid:158786

Trust: 0.2

db:PACKETSTORMid:158673

Trust: 0.2

db:PACKETSTORMid:158788

Trust: 0.1

db:PACKETSTORMid:158664

Trust: 0.1

db:PACKETSTORMid:158691

Trust: 0.1

db:PACKETSTORMid:158685

Trust: 0.1

db:PACKETSTORMid:158676

Trust: 0.1

db:PACKETSTORMid:158785

Trust: 0.1

db:CNVDid:CNVD-2020-43481

Trust: 0.1

db:VULHUBid:VHN-184639

Trust: 0.1

db:VULMONid:CVE-2020-6514

Trust: 0.1

sources: VULHUB: VHN-184639 // VULMON: CVE-2020-6514 // PACKETSTORM: 158686 // PACKETSTORM: 158787 // PACKETSTORM: 158678 // PACKETSTORM: 158786 // PACKETSTORM: 158673 // PACKETSTORM: 158804 // CNNVD: CNNVD-202007-1004 // NVD: CVE-2020-6514

REFERENCES

url:http://packetstormsecurity.com/files/158697/webrtc-usrsctp-incorrect-call.html

Trust: 2.4

url:https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html

Trust: 2.4

url:https://www.debian.org/security/2020/dsa-4736

Trust: 1.9

url:https://support.apple.com/kb/ht211288

Trust: 1.8

url:https://support.apple.com/kb/ht211290

Trust: 1.8

url:https://support.apple.com/kb/ht211291

Trust: 1.8

url:https://support.apple.com/kb/ht211292

Trust: 1.8

url:https://www.debian.org/security/2020/dsa-4740

Trust: 1.8

url:https://www.debian.org/security/2021/dsa-4824

Trust: 1.8

url:https://security.gentoo.org/glsa/202007-08

Trust: 1.8

url:https://security.gentoo.org/glsa/202007-64

Trust: 1.8

url:https://security.gentoo.org/glsa/202101-30

Trust: 1.8

url:https://crbug.com/1076703

Trust: 1.8

url:https://lists.debian.org/debian-lts-announce/2020/07/msg00027.html

Trust: 1.8

url:https://lists.debian.org/debian-lts-announce/2020/08/msg00006.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00022.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00032.html

Trust: 1.8

url:https://usn.ubuntu.com/4443-1/

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-6514

Trust: 1.2

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/mtrpptkz2rkvh2xgqcwnfz7fogq5llca/

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/myidwchg24ztfd4p42d4a4wwppa74bcg/

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/myidwchg24ztfd4p42d4a4wwppa74bcg/

Trust: 0.7

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/mtrpptkz2rkvh2xgqcwnfz7fogq5llca/

Trust: 0.7

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.6

url:https://access.redhat.com/security/team/contact/

Trust: 0.6

url:https://bugzilla.redhat.com/):

Trust: 0.6

url:https://access.redhat.com/security/team/key/

Trust: 0.6

url:https://access.redhat.com/articles/11258

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2020-6514

Trust: 0.6

url:https://vigilance.fr/vulnerability/chrome-multiple-vulnerabilities-32838

Trust: 0.6

url:https://vigilance.fr/vulnerability/webrtc-information-disclosure-via-internal-address-leak-32960

Trust: 0.6

url:http://www.nsfocus.net/vulndb/50126

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2580/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2410/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2640/

Trust: 0.6

url:https://packetstormsecurity.com/files/158565/gentoo-linux-security-advisory-202007-08.html

Trust: 0.6

url:https://packetstormsecurity.com/files/158678/red-hat-security-advisory-2020-3241-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2675/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2851/

Trust: 0.6

url:https://packetstormsecurity.com/files/158789/red-hat-security-advisory-2020-3345-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2743/

Trust: 0.6

url:https://support.apple.com/en-us/ht211291

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2623/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2703/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0024/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2757/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2605/

Trust: 0.6

url:https://packetstormsecurity.com/files/158804/red-hat-security-advisory-2020-3377-01.html

Trust: 0.6

url:https://support.apple.com/en-us/ht211290

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2020-15652

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2020-15659

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2020-15659

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2020-15652

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2020-6463

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2020-6463

Trust: 0.5

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.5

url:https://www.mozilla.org/en-us/security/advisories/mfsa2020-31/

Trust: 0.3

url:https://access.redhat.com/errata/rhsa-2020:3241

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/200.html

Trust: 0.1

url:https://github.com/cudi1999/cve-2020-6514

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:3253

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:3341

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:3342

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:3229

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6516

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6535

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6533

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6515

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#critical

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6536

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:3377

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6529

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6541

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6523

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6511

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6537

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6517

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6537

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6522

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6513

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6531

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6527

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6536

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6528

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6526

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6534

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6520

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6540

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6531

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6532

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6526

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6525

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6518

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6512

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6527

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6520

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6532

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6524

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6519

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6522

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6528

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6512

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6518

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6513

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6521

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6519

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6535

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6515

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6533

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6539

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6530

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6516

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6538

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6517

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6510

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6521

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6511

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6530

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6525

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6510

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6534

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6524

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6529

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6523

Trust: 0.1

sources: VULHUB: VHN-184639 // VULMON: CVE-2020-6514 // PACKETSTORM: 158686 // PACKETSTORM: 158787 // PACKETSTORM: 158678 // PACKETSTORM: 158786 // PACKETSTORM: 158673 // PACKETSTORM: 158804 // CNNVD: CNNVD-202007-1004 // NVD: CVE-2020-6514

CREDITS

Red Hat

Trust: 0.6

sources: PACKETSTORM: 158686 // PACKETSTORM: 158787 // PACKETSTORM: 158678 // PACKETSTORM: 158786 // PACKETSTORM: 158673 // PACKETSTORM: 158804

SOURCES

db:VULHUBid:VHN-184639
db:VULMONid:CVE-2020-6514
db:PACKETSTORMid:158686
db:PACKETSTORMid:158787
db:PACKETSTORMid:158678
db:PACKETSTORMid:158786
db:PACKETSTORMid:158673
db:PACKETSTORMid:158804
db:CNNVDid:CNNVD-202007-1004
db:NVDid:CVE-2020-6514

LAST UPDATE DATE

2026-04-09T21:23:40.402000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-184639date:2021-07-21T00:00:00
db:VULMONid:CVE-2020-6514date:2023-11-07T00:00:00
db:CNNVDid:CNNVD-202007-1004date:2021-11-03T00:00:00
db:NVDid:CVE-2020-6514date:2024-11-21T05:35:52.533

SOURCES RELEASE DATE

db:VULHUBid:VHN-184639date:2020-07-22T00:00:00
db:VULMONid:CVE-2020-6514date:2020-07-22T00:00:00
db:PACKETSTORMid:158686date:2020-07-31T19:38:46
db:PACKETSTORMid:158787date:2020-08-06T17:06:39
db:PACKETSTORMid:158678date:2020-07-30T15:51:39
db:PACKETSTORMid:158786date:2020-08-06T17:06:31
db:PACKETSTORMid:158673date:2020-07-30T15:51:02
db:PACKETSTORMid:158804date:2020-08-10T14:26:27
db:CNNVDid:CNNVD-202007-1004date:2020-07-14T00:00:00
db:NVDid:CVE-2020-6514date:2020-07-22T17:15:13.447